diff --git a/flake.lock b/flake.lock index b224671..a50de4c 100644 --- a/flake.lock +++ b/flake.lock @@ -86,11 +86,11 @@ }, "flake-compat": { "locked": { - "lastModified": 1696426674, - "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=", + "lastModified": 1733328505, + "narHash": "sha256-NeCCThCEP3eCl2l/+27kNNK7QrwZB1IJCrXfrbv5oqU=", "owner": "edolstra", "repo": "flake-compat", - "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33", + "rev": "ff81ac966bb2cae68946d5ed5fc4994f96d0ffec", "type": "github" }, "original": { @@ -246,11 +246,11 @@ ] }, "locked": { - "lastModified": 1733769654, - "narHash": "sha256-aVvYDt8eitZVF6fdOrSoIzYRkQ5Gh6kfRvqkiaDRLL0=", + "lastModified": 1734344598, + "narHash": "sha256-wNX3hsScqDdqKWOO87wETUEi7a/QlPVgpC/Lh5rFOuA=", "owner": "nix-community", "repo": "home-manager", - "rev": "e952e94955dcc6fa2120c1430789fc41363f5237", + "rev": "83ecd50915a09dca928971139d3a102377a8d242", "type": "github" }, "original": { @@ -289,11 +289,11 @@ "nixpkgs": "nixpkgs_2" }, "locked": { - "lastModified": 1731668526, - "narHash": "sha256-ZszfGYOrwol3MGFpttahldT+UOfqXckk6XwZrUyHLxE=", + "lastModified": 1734239219, + "narHash": "sha256-iKY/OGNANXpd9hXBGfx8vObpHW4IcOH0MrerLCCc7hA=", "owner": "thiagokokada", "repo": "nix-alien", - "rev": "97fe58a8ac15663b1ecdebd84d2187eb71f8532d", + "rev": "a266d0f74dd4a82ec6a72b02fbf3fbc5f7105f15", "type": "github" }, "original": { @@ -325,11 +325,11 @@ ] }, "locked": { - "lastModified": 1731593150, - "narHash": "sha256-FvksinoI2Y6kuwH+cKBu1oDA8uPGfoRqgtQV6O8GDc4=", + "lastModified": 1734234111, + "narHash": "sha256-icEMqBt4HtGH52PU5FHidgBrNJvOfXH6VQKNtnD1aw8=", "owner": "nix-community", "repo": "nix-index-database", - "rev": "40d882b55e89add1ded379cc99edaab24983d6d9", + "rev": "311d6cf3ad3f56cb051ffab1f480b2909b3f754d", "type": "github" }, "original": { @@ -376,11 +376,11 @@ }, "nixpkgs_2": { "locked": { - "lastModified": 1731319897, - "narHash": "sha256-PbABj4tnbWFMfBp6OcUK5iGy1QY+/Z96ZcLpooIbuEI=", + "lastModified": 1733940404, + "narHash": "sha256-Pj39hSoUA86ZePPF/UXiYHHM7hMIkios8TYG29kQT4g=", "owner": "NixOS", "repo": "nixpkgs", - "rev": "dc460ec76cbff0e66e269457d7b728432263166c", + "rev": "5d67ea6b4b63378b9c13be21e2ec9d1afc921713", "type": "github" }, "original": { @@ -408,11 +408,11 @@ }, "nixpkgs_4": { "locked": { - "lastModified": 1733759999, - "narHash": "sha256-463SNPWmz46iLzJKRzO3Q2b0Aurff3U1n0nYItxq7jU=", + "lastModified": 1734119587, + "narHash": "sha256-AKU6qqskl0yf2+JdRdD0cfxX4b9x3KKV5RqA6wijmPM=", "owner": "nixos", "repo": "nixpkgs", - "rev": "a73246e2eef4c6ed172979932bc80e1404ba2d56", + "rev": "3566ab7246670a43abd2ffa913cc62dad9cdf7d5", "type": "github" }, "original": { @@ -501,11 +501,11 @@ "tinted-tmux": "tinted-tmux" }, "locked": { - "lastModified": 1733835365, - "narHash": "sha256-htFKTDIu3ZiK/cFXiiQWXLNDKRdXWC8YXkhDtt5nsPE=", + "lastModified": 1734110168, + "narHash": "sha256-Q0eeLYn45ErXlqGQyXmLLHGe1mqnUiK0Y9wZRa1SNFI=", "owner": "danth", "repo": "stylix", - "rev": "9f019b78fd5ff6ecb352269fc73bbcd1d35c90a8", + "rev": "a9e3779949925ef22f5a215c5f49cf520dea30b1", "type": "github" }, "original": { diff --git a/modules/nixos/core/network.nix b/modules/nixos/core/network.nix index 15d7776..c82cb19 100644 --- a/modules/nixos/core/network.nix +++ b/modules/nixos/core/network.nix @@ -56,7 +56,7 @@ in with lib; { }; }; - networking.firewall.allowedUDPPorts = [ 51820 ]; + networking.firewall.allowedUDPPorts = [ 51820 16261 ]; networking.wg-quick.interfaces = lib.mkIf (wg.id != null) { wg0 = { address = [ diff --git a/modules/nixos/desktop/gaming.nix b/modules/nixos/desktop/gaming.nix index ef1ddbf..9e10dc6 100644 --- a/modules/nixos/desktop/gaming.nix +++ b/modules/nixos/desktop/gaming.nix @@ -6,5 +6,23 @@ programs.gamemode.enable = true; users.users.${config.mods.user.name}.extraGroups = lib.mkAfter [ "gamemode" ]; + + networking.firewall.allowedTCPPorts = [ 3075 34000 ]; + networking.firewall.allowedTCPPortRanges = [ + { + from = 27015; + to = 27030; + } + { + from = 27036; + to = 27037; + } + ]; + + networking.firewall.allowedUDPPorts = [ 3075 4380 27036 34000 ]; + networking.firewall.allowedUDPPortRanges = [{ + from = 27000; + to = 27031; + }]; }; } diff --git a/modules/nixos/server/grav/default.nix b/modules/nixos/server/grav/default.nix index 8ffb937..a29b32f 100644 --- a/modules/nixos/server/grav/default.nix +++ b/modules/nixos/server/grav/default.nix @@ -13,6 +13,7 @@ in with lib; { }; config = { + networking.firewall = { allowedTCPPorts = [ 443 80 ]; }; services.grav = mkIf cfg.grav.enable { enable = true; systemSettings = { @@ -20,5 +21,6 @@ in with lib; { pages = { theme = "agency"; }; }; }; + users.users.${config.mods.user.name}.extraGroups = lib.mkAfter [ "grav" ]; }; }